{
"Source": "CVE FEED",
"Title": "CVE-2025-9933 - PHPGurukul Beauty Parlour Management System SQL Injection",
"Content": "CVE ID : CVE-2025-9933
Published : Sept. 4, 2025, 1:09 a.m. | 1 hour, 51 minutes ago
Description : A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. Such manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9933 - PHPGurukul Beauty Parlour Management System SQL Injection",
"Content": "CVE ID : CVE-2025-9933
Published : Sept. 4, 2025, 1:09 a.m. | 1 hour, 51 minutes ago
Description : A vulnerability has been found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this issue is some unknown functionality of the file /admin/view-appointment.php. Such manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9931 - Jinher OA Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9931
Published : Sept. 4, 2025, 1:09 a.m. | 1 hour, 51 minutes ago
Description : A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9931 - Jinher OA Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9931
Published : Sept. 4, 2025, 1:09 a.m. | 1 hour, 51 minutes ago
Description : A vulnerability was detected in Jinher OA 1.0. Affected is an unknown function of the file /jc6/platform/sys/login!changePassWord.action of the component POST Request Handler. The manipulation of the argument Account results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9930 - "1000projects Beauty Parlour Management System SQL Injection Vulnerability"",
"Content": "CVE ID : CVE-2025-9930
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in 1000projects Beauty Parlour Management System 1.0. This impacts an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9930 - "1000projects Beauty Parlour Management System SQL Injection Vulnerability"",
"Content": "CVE ID : CVE-2025-9930
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in 1000projects Beauty Parlour Management System 1.0. This impacts an unknown function of the file /admin/contact-us.php. The manipulation of the argument mobnumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9941 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9941
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A flaw has been found in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /register.php. Executing manipulation of the argument uimage can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9941 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9941
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A flaw has been found in CodeAstro Real Estate Management System 1.0. This impacts an unknown function of the file /register.php. Executing manipulation of the argument uimage can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58057 - Netty BrotliDecoder Denial of Service Vulnerability",
"Content": "CVE ID : CVE-2025-58057
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-58057 - Netty BrotliDecoder Denial of Service Vulnerability",
"Content": "CVE ID : CVE-2025-58057
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. In netty-codec-compression versions 4.1.124.Final and below, and netty-codec versions 4.2.4.Final and below, when supplied with specially crafted input, BrotliDecoder and certain other decompression decoders will allocate a large number of reachable byte buffers, which can lead to denial of service. BrotliDecoder.decompress has no limit in how often it calls pull, decompressing data 64K bytes at a time. The buffers are saved in the output list, and remain reachable until OOM is hit. This is fixed in versions 4.1.125.Final of netty-codec and 4.2.5.Final of netty-codec-compression.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58358 - Markdownify Command Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58358
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-58358 - Markdownify Command Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58358
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : Markdownify is a Model Context Protocol server for converting almost anything to Markdown. Versions below 0.0.2 contain a command injection vulnerability, caused by the unsanitized use of input parameters within a call to child_process.exec, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. The server constructs and executes shell commands using unvalidated user input directly within command-line strings. This introduces the possibility of shell metacharacter injection (|, >, &&, etc.). This issue is fixed in version 0.0.2.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9929 - "Code-Projects Responsive Blog Site Cross Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-9929
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9929 - "Code-Projects Responsive Blog Site Cross Site Scripting Vulnerability"",
"Content": "CVE ID : CVE-2025-9929
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A weakness has been identified in code-projects Responsive Blog Site 1.0. This affects an unknown function of the file blogs_view.php. Executing manipulation of the argument product_code/gen_name/product_name/supplier can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-58357 - 5ire Cross-Platform Desktop AI Assistant Content Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58357
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Version 0.13.2 contains a vulnerability in the chat page's script gadgets that enables content injection attacks through multiple vectors: malicious prompt injection pages, compromised MCP servers, and exploited tool integrations. This is fixed in version 0.14.0.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-58357 - 5ire Cross-Platform Desktop AI Assistant Content Injection Vulnerability",
"Content": "CVE ID : CVE-2025-58357
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : 5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. Version 0.13.2 contains a vulnerability in the chat page's script gadgets that enables content injection attacks through multiple vectors: malicious prompt injection pages, compromised MCP servers, and exploited tool integrations. This is fixed in version 0.14.0.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9939 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9939
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. The impacted element is an unknown function of the file /propertyview.php. Such manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9939 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9939
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A security vulnerability has been detected in CodeAstro Real Estate Management System 1.0. The impacted element is an unknown function of the file /propertyview.php. Such manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9940 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9940
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability was detected in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /feature.php. Performing manipulation of the argument msg results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9940 - CodeAstro Real Estate Management System Cross-Site Scripting Vulnerability",
"Content": "CVE ID : CVE-2025-9940
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability was detected in CodeAstro Real Estate Management System 1.0. This affects an unknown function of the file /feature.php. Performing manipulation of the argument msg results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-9942 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9942
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /submitproperty.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-9942 - CodeAstro Real Estate Management System Unrestricted File Upload Vulnerability",
"Content": "CVE ID : CVE-2025-9942
Published : Sept. 4, 2025, 3:27 a.m. | 3 hours, 48 minutes ago
Description : A vulnerability has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /submitproperty.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-43772 - Liferay Portal Liferay DXP DoS Memory Consumption Vulnerability",
"Content": "CVE ID : CVE-2025-43772
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-43772 - Liferay Portal Liferay DXP DoS Memory Consumption Vulnerability",
"Content": "CVE ID : CVE-2025-43772
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Kaleo Forms Admin in Liferay Portal 7.0.0 through 7.4.3.4, and Liferay DXP 7.4 GA, 7.3 GA through update 27, and older unsupported versions does not restrict the saving of request parameters in the portlet session, which allows remote attackers to consume system memory leading to denial-of-service (DoS) conditions via crafted HTTP request.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36905 - Apache GIS Local Privilege Escalation Vulnerability",
"Content": "CVE ID : CVE-2025-36905
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In gxp_mapping_create of gxp_mapping.c, there is a possible privilege escalation due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36895 - Citrix NetScaler XML External Entity (XXE) Information Disclosure",
"Content": "CVE ID : CVE-2025-36895
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36900 - "Logitech Wi-Fi Smart Code Vulnerability - Integer Overflow"",
"Content": "CVE ID : CVE-2025-36900
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In lwis_test_register_io of lwis_device_test.c, there is a possible OOB Write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36904 - Apache Tomcat Remote Code Execution",
"Content": "CVE ID : CVE-2025-36904
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36892 - Apache HTTP Server HTTP/2 Server Header Injection",
"Content": "CVE ID : CVE-2025-36892
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Denial of service
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36909 - Apache Struts SSRF",
"Content": "CVE ID : CVE-2025-36909
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Information disclosure
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36906 - Darwinn MLIR Converter AIDL Heap Buffer Overflow (EoP)",
"Content": "CVE ID : CVE-2025-36906
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : In ConvertReductionOp of darwinn_mlir_converter_aidl.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36896 - Apache Struts Deserialization RCE",
"Content": "CVE ID : CVE-2025-36896
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : N/A
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2025-36891 - Apache HTTP Server Local File Inclusion",
"Content": "CVE ID : CVE-2025-36891
Published : Sept. 4, 2025, 7:10 a.m. | 2 hours, 8 minutes ago
Description : Elevation of privilege
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "04 Sep 2025",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹